0% found this document useful (0 votes)
232 views12 pages

Hackers

The document discusses the history and types of hacking. It outlines four periods in the history of hacking from the 1960s to the 1990s, including important events and people. It then describes the three main types of hackers: black hat hackers who hack maliciously; white hat hackers who hack ethically with permission; and grey hat hackers who operate in a neutral manner sometimes reporting vulnerabilities. The document also covers the ILOVEYOU computer virus from 2000 and discusses perspectives on whether hacking advances technology or violates ethics.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
232 views12 pages

Hackers

The document discusses the history and types of hacking. It outlines four periods in the history of hacking from the 1960s to the 1990s, including important events and people. It then describes the three main types of hackers: black hat hackers who hack maliciously; white hat hackers who hack ethically with permission; and grey hat hackers who operate in a neutral manner sometimes reporting vulnerabilities. The document also covers the ILOVEYOU computer virus from 2000 and discusses perspectives on whether hacking advances technology or violates ethics.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Hackers

I. History of hacking

II. Introduction

III. Body

IV. Conclusion

I. History of hacking

 1960’s
MIT’s artificial lab
Ken Thompson invented UNIX
 1970’s
Dennis Ritchie invented C
 1980’s
Cyber Space Coined
414s arrested
Two hacker group formed
 1990’s
National Crack down on hackers
Kevin Mitnick arrested
Microsoft NT operating system
 World Most Famous Hacker
Stephen Wozniak
Kevin Mitnick

Tsutomu Shimomura

 Hackers in the Philippines

Onel De Guzman

ILOVEYOU, sometimes referred to as Love Bug or Love Letter for you,


is a computer worm that infected over ten million Windows personal
computers on and after 5 May 2000 when it started spreading as an email
message with the subject line "ILOVEYOU" and the attachment "LOVE-
LETTER-FOR-YOU.TXT.vbs". The latter file extension ('vbs', a type
of interpreted file), was most often hidden by default
on Windows computers of the time (as it is an extension for a file type that
is known by Windows), leading unwitting users to think it was a normal
text file. Opening the attachment activates the Visual Basic script. The
worm inflicts damage on the local machine, overwriting random types of
files (including Office files, image files, and audio files; however after
overwriting MP3 files the virus hides the file), and sends a copy of itself to
all addresses in the Windows Address Book used by Microsoft Outlook.
This made it spread much faster than any other previous email worm.
The malware was created by Onel de Guzman, a then-24-year-old
resident of Manila, Philippines. Because there were no laws in the
Philippines against creating malware at the time of its creation,
the Philippine Congress enacted Republic Act No. 8792, otherwise known
as the E-Commerce Law, in July 2000, in order to discourage future
iterations of such activity. The Constitution of the Philippines bans ex post
facto laws, however, and as such, de Guzman could not be prosecuted.

II. Introduction

Hacker is a person who access computer system and network without


authorization. A hacker is a person skilled in information technology who uses
their technical knowledge to achieve a goal or overcome an obstacle, within a
computerized system by non-standard means. Though the term hacker has
become associated in popular culture with a security hacker – someone who
utilizes their technical know-how of bugs or exploits to break into computer
systems and access data which would otherwise be unavailable to them –
hacking can also be utilized by legitimate figures in legal situations. For
example, law enforcement agencies sometimes use hacking techniques in
order to collect evidence on criminals and other malicious actors. This could
include using anonymity tools (such as a VPN, or the dark web) to mask their
identities online, posing as criminals themselves. Likewise, covert world
agencies can employ hacking techniques in the legal conduct of their work.
Oppositely, hacking and cyber-attacks are used extra- and illegally by law
enforcement and security agencies (conducting warrantless activities), and
employed by State actors as a weapon of both legal and illegal warfare.
Three Types of Hackers
The three types of hackers are the white hat hacker, the grey hat hacker, and
the black hat hacker. Each type of hacker hacks for a different reason, a
cause, or both. All have the required skills needed to accomplish their
mission. At one end of the spectrum is the black hat, who hacks for evil and
malicious intent and without permission. On the other end of the spectrum is
the white hat, who hacks against a black hat in order to protect computer and
network access and has the company's permission to do so. In the middle is
the grey hat, who hacks not for evil and not for good; they are neutral in their
cause and usually try to sell their skills for monetary gain, like a mercenary.

1. Black Hat

Black hat hackers are normally responsible for creating malware, which is
frequently used to infiltrate computerized networks and systems. They’re
usually motivated by personal or financial gain, but can also participate in
espionage, protests, or merely enjoy the thrill. Black hat hackers can be
anyone from amateurs to highly experienced and knowledgeable individuals
looking to spread malware, steal private data, like login credentials, along with
financial and personal information. Upon accessing their targets and
depending on their motives, black hat hackers can either steal, manipulate, or
destroy system data.

2. White Hat

Also known as “ethical hackers,” they’re often employed or contracted by


companies and governmental entities, working as security specialists looking
for vulnerabilities. While they employ the same methods as black hat hackers,
they always have permission from the system’s owner, making their actions
completely legal. White hat hackers implement strategies like penetration
tests, monitor in-place security systems, along with vulnerability assessments.
Ethical hacking, the term used to describe the nature of a white hat hackers’
actions, can even be learned through independent sources, training,
conferences, and certifications.

3. Grey Hat

As the name suggests, these individuals utilize aspects from black and white
hat hackers, but will usually seek out vulnerabilities in a system without an
owner’s permission or knowledge. While they’ll report any issues they
encounter to the owner, they’ll also request some sort of compensation or
incentive. Should the owner not respond or reject their proposition, a grey hat
hacker might exploit the newfound flaws. Grey hat hackers aren’t malicious by
nature, but do seek to have their efforts rewarded. Since grey hat hackers
don’t have permission to access the system by its owner, their actions are
ultimately considered illegal, despite any alarming findings they might reveal.

III. Body

Hacking involves using a computer to gain unauthorized access to another


computer system. Although at first “hacker” was a positive term for a person
with a mastery of computers who could push programs beyond what they
were designed to do, it has by now become almost synonymous with illegal
activities like breaking into protected computer systems, releasing viruses,
stealing passwords or other sensitive data, denial of service so on.
Unnumbered hacking crimes happens everyday and the number of hacking
crimes is still increase everyday. So overcome the hacking crime must be
imperative under this situation. If we want to overcome hacking crime, not
only know the motivation and mentality of hacking and why hacking
perpetrates as a computer crime, but we also need to research the
participants of hacking and the rank of importance of difference participants.

From analysis hacking, we should find out some appropriate solutions of


hacking crime. Although hacking has already become synonymous with illegal
activities or computer crime, hacking also refers as great skill and knowledge
of computing. If hacking can perform following the ethical standard, hacking is
also a kind of power that can advance technology and society development. A
description of the ethical choices involved in the issue. Where possible we
should indicate both sides of the dilemma. Issue is concerned with control in
use of computers and the development of computer systems. There is a line
between right and wrong side of issue on hacking. The line should be the
computing ethics.

First the right side of the hacking. Hacking involves using a computer to gain
unauthorized access to another computer system. It acts requiring great skill
and knowledge of computer systems. No system or software is one hundred
secure and safe. With the help of hacking it can detect system or software
security problems. Also it can detect new flaws and bugs all the time.
Therefore they need to build newer and better versions of software to
overcome the found flaws and bugs. If there is no hacking in the world, the
technology won’t have advanced to today’s standard and we won’t have the
improvement in software and system that we have today. So the hacking can
advance the development of computer system.
Hackers only need all information should be free. If all information were free
there would be no computer crime happens. It would save money, time, and
resource to do the protection of the system or software. So hacking advance
the freedom of information. Hackers are doing no harm and changing
nothing. The hacking cannot cause assault and battery to anybody. Hacking
merely learns how systems operate. Hacking doesn’t disturb human natural
life.

But the hacking has another “wrong” side. Although hacking doesn’t cause
assault and battery to anybody directly, it usually performances activities like
breaking into protected computer systems, releasing viruses, stealing
passwords or other sensitive data, denial of service so on. And public
announcements of hacking may affect customer trust and privacy. So hacking
is damaging computer ethics, people’s privacy, and human rights. Hacking
has already perpetrated a crime. So we need to detect and overcome
hacking. But overcoming and detecting hacking usually spends high cost of
time, resource, and money. So hacking is the reason to run to waste. In
conclusion, if it performances following the ethical standard, hacking will
seemed to be right and should be developed. If it perpetrates a crime and
does harm to human and society, hacking will seemed to be wrong and be
overcome.

An identification of the primary, secondary and implied participants in the


issue.

Primary participants

* Hacker has extraordinary programming skill, cleverness in the face of


difficulty, an ability to suspend all other activities while producing a solution to
a problem, an appreciation for a clever solution to a seemingly insignificant
problem and uses a computer to gain unauthorized access to another
computer system.

* Company, be hacked, computer system be broke in or password is stolen,


the casualty in hacking crime. Secondary participants

* Programmer, has sound programming skill, responsible for developing


system and maintaining system

* System analyst, responsible for doing researching and analyzing system,


making decisions in the development of the system, and testing the system.
* The customer, who is the customer of the company that is hacked, who is
the user of the software or system that is hacked Implied participants

* Students, be clever, have enough time to commit a crime, love computer,


and have extraordinary programming skill.

* Programmer, who built software to detect system or software security


problems and the software, is misused by hacker.

* Company white collar, uses computer every day and has sound internet
skill.

The motivation of hacking

* Economic motive

an article about the hackers in a magazine. A pressman asks a hacker:” why


do you hack?” The hacker answers:” For money.” Most of hacker hack
computer for heist money. They use their greater computing skill and
knowledge to gain unauthorized access to another computer system easily.
After they break in the system, they can heist money as they wish. There is a
case about the economic motive of hacking: In late 1980s, First National Bank
of Chicago is the victim of a $70-million computer
heist.[www.sptimes.com/Hackers/story_level.html; Article Title: A history of
hacking] According the case above, we can see in that event First National
Bank lost 70 millions dollars. First National Bank is the direct victim of this
event. And the customer is the indirect victim of this event. The hacking has
damages the customer’s natural life and human rights. The hacking in this
case has perpetrated a crime and not been ethical.

* Occupationally related

Some employers don’t satisfy the employees. Therefore the employers hack
the company’s computer system to retaliate the employer. The employers
break in the company’s computer system to distribute computer virus,
maliciously delete company’s important files, or make some changes of
company’s account to obtain fraudulent credit. If the employers do like that,
the employers have perpetrated a crime. Because the employers damage the
company, and customer trust and privacy by hacking. Finally the employer
will be punished by lawing.
* Understanding systems

Some companies usually find some hackers to hack companies’ new system.
Every company wants to build a security and safe computer system. But there
is no one hundred percent security and safe system in the real-world. The
company wants to find the bugs, flaws and any other problems with the help
of hacking system. So the company finds some hackers using different great
computing skill to hack the new system to detect the problems as soon as
possible before the system is used. Hacking can advance the development of
computing system. In that way, hacking will be professional ethical.

* To find stimulate and challenge

Some people like to hack computer systems because they want to find
stimulate challenge. Most of this kind of people is student. Student has
enough time, computing skill or knowledge, and curiosity to hack computer
systems. I heart a case that several years ago, two students hacked U.S.
National Defense Department computer system. At last, the two students
were caught. Because hacking a computer system without the permission of
the host or the owner of the system is an illegal activity. Breaking into
computer system with unauthorized access is also not ethical, because it
damages the department security. All above show that, if the motivation of
hacking is for self economic motive, heist money, retaliation or any other
things, it will be seemed not ethical. If the motivation of hacking is for
advancing the development of system or software, it will be seemed
professional ethical. In another word to say if you hack a computer system
with the permission of the host or the owner of the system, your action will be
ethical and legal. If not, your action will be not ethical and illegal. And greater
the crime you perpetrated, higher the gallows you will be punished.
Characteristic of hacking

* Learning something special of a programming language or system

Hacking is a special skill in using programming language that cannot be


learned from the lecture of university. Someone wants to learn the special
things of programming or system from that.

* Producing and practicing the programming is better than just


theorizing about it

Hacking is more important in practicing programming. If you just theorizing


programming and never producing/practicing programming, you will never
hack system successfully.

* Appreciating someone else’s hacking

Hacking doesn’t only need great skill and knowledge, it also needs
interesting. Some hacker doesn’t know what is hacking before becoming a
hacker. He will know hacking from appreciating someone else’s hacking. He
is interesting in hacking and start to learning harking.

* Learning a new programming language

fast A good hacker must have the capable to learn a new programming
language fast. In the real-world, the technology is changing and increasing
fast. And the system is building more security and safe using different and
new technology. So a good hacker should have the capable to learn a new
programming language fast to fit the real world.

* Hacking needs great computing skill and knowledge

Hacking a system means breaking in a system. It doesn’t only need to know


how to build a system, but also needs to know how to find a bug or flaws in
the system to break in the system. So hacking need great computing skill and
knowledge. From the characteristics of hacking you can know hacking is a
very professional speciality. It needs a person have great programming skill
and knowledge, cleverness in the face of difficulty, an ability to suspend all
other activities while producing a solution to a problem, an appreciation for a
clever solution to a seemingly insignificant problem. If the hacking doesn’t
follow the computing ethical standard that damaging computer ethics,
people’s privacy, human rights and our natural life, it must be overcome as
soon as be detected. If the hacking follows the computing ethical standard
that advance the development of system and IT industry, it will be gone on
developing

IV. Conclusion

Hackers and Crackers


For ordinary people, there is no significant difference between a hacker and a
cracker. When they hear these two words, they typically think of piracy,
unauthorized accessing of files and security numbers, information theft,
viruses or generally giving person problems with their normal computer
usage.

A hacker is a person adept with the in’s and out’s of computers and the
underlying programs who tries to push its way into a system. This is the
typical connotation when someone hears the word hacker. However, in
today’s world, there are two types of hackers, the white hat hackers or the
ethical hackers and those black hat or unethical hackers (crackers). White hat
hackers are hackers who try to intrude into a computer system for the
purpose of testing the software. Possible intrusion scenarios are identified
and tried on a particular organizations system with their permission to test for
possible vulnerabilities which they could check later on. (Goodwin, 2008)
Sometimes, a person wants to be a hacker to gain more knowledge of a
particular system.
Black hackers or the crackers, on the other hand, are hackers who hack a
particular system for their own personal reasons. They can either be a
network hacker, who can sabotage important data, get access to one’s PIN
numbers of do some other damages to an organization’s system. Software
crackers are people who try to” crack” the security or installation codes of
licensed software to be able use the specific software even without the buying
the licence. A cracker can also be a virus attacker who writes programs for
the purpose of interrupting the normal operation of one’s computer.
The main difference between a hacker and a cracker lies with their intentions.
Basically, one starts on being a hacker and once his intention ships from
software testing and education to harming other’s files, stealing from others,
or pirating other’s works, they become crackers.(Security-FAQs.com, 2012)
The psychological attributes and intent of the hackers should be considered
when making punishments for people who are caught, because, those people
who hack for the purpose of learning must be given consideration. How could
they learn if they will not be try? However, people who have the intention of
inflicting problems must be punished according to the degree of damage they
made.

References

Goodwin, David A. (2008). “A Profile of a Typical Hacker”. Helium.com.


Retrieved on 2012 March 2 from http://www.helium.com/items/843947-the-
profile-of-a-typical-hacker
Security-FAQs.com. (2012). “What Makes a Hacker Hack, A Cracker Crack?”.
Retrieved on 2012 March 2 from http://www.security-faqs.com/what-makes-a-
hacker-hack-and-a-cracker-crack.html

Hacking is a serious concern for any business nowadays. In fact, it


is almost a statistical certainty that at some point, any given company
will suffer a data breach. In spite of this, the pressure to keep up with the
rapidly developing technology industry leads to carelessness in securing
computer systems. While the desire to maximize profit is
understandable, computer crime can affect people'slives so dramatically
that companies are ethically obligated to secure their systems, even if the
extra time and resources reduce revenue. To this end, a full-disclosure policy
is needed. Users and developers must be able to see the underlying flaws
and vulnerabilities in the systems they employ if they are to perfect
them.The task of ensuring computer security does not rest with the
developers alone. As holes in outdated software can be used to
break in and cause an entire system to collapse, users have the
responsibility to be aware of updates and act promptly. For companies
employing software developed by others, they are required to ensure
everything is properly configured and up-to-date, regardless of the
financial cost of such a setup. Furthermore, if full-disclosure policies are
to be implemented by developers, then the public has the additional duty of
carefully reviewing the analysis of security issues and demanding patches
for problems encountered. Security requires two-way communication,
with developers spelling out the details of their products and
consumers reporting any new issues they encounter. Such a change
will require a shift in marketing tactics and development cycles, but as our
lives revolve more and more around computerized systems, these
changes become all the more necessary.

References

1. "Sony's PlayStation Hack Apology.”BBC. N.p., 27 Apr. 2011. Web


2.Singolda, Adam. "Update: Taboola Security Breach – Identified and Fully
Resolved." Taboola. N.p., 23 June 2014. Web. 3 Nov. 2015.
3. Perceptions About Network Security. Ponemac Institute. Juniper Networks.
June 2011.
4. Dorbian, Iris. "Did Home Depot's Outdated Software Help Hackers?" CFO.
N.p., 16 Sept. 2014. Web. 03 Nov. 2015.
5. "Exploit Wednesday." AfterDawn. Web.
6. Dickman, Frank. "Hacking The Industrial SCADA Network." Hacking The
Industrial SCADA Network. Nov. 2009. Web. 04 Nov. 2015.
7. Ghena, Branden, William Beyer, Allen Hillaker, Jonathan Pevarnek, and J.
Alex Halderman. "Green Lights Forever: Analyzing the Security of Traffic
Infrastructure." (n.d.): n. pag. University of Michigan. Web.
8. Russell, Alec. "CIA Plot Led to Huge Blast in Siberian Gas Pipeline." The
Telegraph. Telegraph Media Group, 28 Feb. 2004. Web. 29 Nov. 2015.
9. "Downtime, Outages and Failures - Understanding Their True
Costs."Evolven. N.p., n.d. Web. 04 Nov. 2015.
10. ACM Code of Ethics <;
11. IEEE Code of Ethics <;
12. Schneier, Bruce. "Full Disclosure of Security Vulnerabilities a 'Damned
Good Idea'" Schneier on Security. N.p., 01 Jan. 2007. Web. 04 Nov. 201

Submitted by:
Albert C. Malabad Jr

You might also like